-
1
-
-
0032626827
-
Satisfaction and usage: Factors contributing to each in the acceptance of information technology
-
Al-Ghatani, S. S., and King, M. Attitudes, Satisfaction and Usage: Factors Contributing to Each in the Acceptance of Information Technology, In Behaviour and Information Technology, 19, 277-297.
-
Behaviour and Information Technology
, vol.19
, pp. 277-297
-
-
Al-Ghatani, S.S.1
Attitudes, K.M.2
-
2
-
-
0035178273
-
Security enhancements in AODV protocol for wireless ad hoc networks
-
Bhargava, S. and Agrawal, D. P. Security Enhancements in AODV Protocol for Wireless Ad Hoc Networks, In Proceedings of IEEE Vehicular Technology Conference (VTC 2001) Fall, Vol, 4, 2001, 2143-2147.
-
(2001)
Proceedings of IEEE Vehicular Technology Conference (VTC 2001) Fall
, vol.4
, pp. 2143-2147
-
-
Bhargava, S.1
Agrawal, D.P.2
-
3
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
Čapkun, S., Buttýn, L. and Hubaux, J-P. Self-Organized Public-Key Management for Mobile Ad Hoc Networks, In IEEE Transactions on Mobile Computing, Vol. 2, No, 1, 2003, 52-64.
-
(2003)
IEEE Transactions on Mobile Computing
, vol.2
, Issue.1
, pp. 52-64
-
-
Čapkun, S.1
Buttýn, L.2
Hubaux, J.-P.3
-
8
-
-
33745502728
-
-
IEEE Standards Dept, Piscataway, N.J.
-
IEEE Std. 1061-1998, Standard for a Software Quality Metrics Methodology, revision, IEEE Standards Dept, Piscataway, N.J., 1998.
-
(1998)
IEEE Std. 1061-1998, Standard for A Software Quality Metrics Methodology, Revision
-
-
-
12
-
-
33745493480
-
SSE-CMM security metrics
-
Washington, D.C.
-
Jelen, G. SSE-CMM Security Metrics, In NIST and CSSPAB Workshop, Washington, D.C., 2000.
-
(2000)
NIST and CSSPAB Workshop
-
-
Jelen, G.1
-
17
-
-
15844362443
-
Ad hoc networks security
-
Basagni, S., Conti, M., Giordano, S., and Stojmenovic (Eds.), IEEE Press Wiley, New York
-
Michiardi, P., and Molva, R. Ad Hoc Networks Security, In Basagni, S., Conti, M., Giordano, S., and Stojmenovic (Eds.), Ad Hoc Networking, IEEE Press Wiley, New York, 2003.
-
(2003)
Ad Hoc Networking
-
-
Michiardi, P.1
Molva, R.2
-
18
-
-
1842665110
-
Intrusion detection in wireless ad hoc Networks
-
Feb.
-
Mishra, A., Nadkarni, K., and Patcha, A. Intrusion Detection in Wireless Ad Hoc Networks. In IEEE Wireless Communications, Feb. 2004, 48-60.
-
(2004)
IEEE Wireless Communications
, pp. 48-60
-
-
Mishra, A.1
Nadkarni, K.2
Patcha, A.3
-
21
-
-
0036452448
-
Context aware detection of selfish nodes in DSR based ad hoc networks
-
Paul, K. and Westhoff, D. Context Aware Detection of Selfish Nodes in DSR Based Ad Hoc Networks, In Proceedings of IEEE Vehicular Technology Conference, Vol. 56, No. 4., 2002, p. 2424-2429
-
(2002)
Proceedings of IEEE Vehicular Technology Conference
, vol.56
, Issue.4
, pp. 2424-2429
-
-
Paul, K.1
Westhoff, D.2
-
22
-
-
0003843664
-
-
IETF Mobile Ad Hoc Networks Working Group, Internet Draft, work in progress, 17. Feb.
-
Perkins, C. E., Belding-Royer, E. M., and Das, S. R. Ad Hoc On-Demand Distance Vector (AODV) Routing. IETF Mobile Ad Hoc Networks Working Group, Internet Draft, work in progress, 17. Feb. 2003.
-
(2003)
Ad Hoc On-Demand Distance Vector (AODV) Routing
-
-
Perkins, C.E.1
Belding-Royer, E.M.2
Das, S.R.3
-
23
-
-
78649271141
-
Estimation of the security level in wireless E-commerce environment based on ad hoc networks
-
Bucharest, Romania, 21-22 Oct.
-
th European Conference of E-Learning, E-Business, E-Government, E-Work, E-Co-operation E-COMM-LINE 2004, Bucharest, Romania, 21-22 Oct. 2004, 6 p.
-
(2004)
th European Conference of E-learning, E-business, E-government, E-work, E-co-operation E-COMM-LINE 2004
-
-
Savola, R.1
-
24
-
-
0035149763
-
Usability and security - An appraisal of usability issues in information security methods
-
Oct.
-
Schultz, E. E., Proctor, R. W., Lien, M.-C., and Salvendy, G. Usability and Security - An Appraisal of Usability Issues in Information Security Methods, In Computer Security, Vol, 20, No. 7, Oct. 2001, 620-634.
-
(2001)
Computer Security
, vol.20
, Issue.7
, pp. 620-634
-
-
Schultz, E.E.1
Proctor, R.W.2
Lien, M.-C.3
Salvendy, G.4
-
25
-
-
0003969633
-
-
"Orange Book", U.S. Department of Defense Standard, DoD 5200.28-std
-
Trusted Computer System Evaluation Criteria (TCSEC) "Orange Book", 1985, U.S. Department of Defense Standard, DoD 5200.28-std.
-
(1985)
Trusted Computer System Evaluation Criteria (TCSEC)
-
-
-
27
-
-
1842815887
-
Security in mobile ad hoc networks: Challenges and solutions
-
Feb
-
Yang, H., Luo, H., Ye, F., Lu, S., and Zhang, L. Security in Mobile Ad Hoc Networks: Challenges and Solutions, In IEEE Wireless Communications, Vol, 11, No, 1., Feb, 2004, 38-47.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.1
, pp. 38-47
-
-
Yang, H.1
Luo, H.2
Ye, F.3
Lu, S.4
Zhang, L.5
-
29
-
-
0033357103
-
Securing ad hoc networks
-
Nov/Dec
-
Zhou, L., and Haas, Z. J. Securing Ad Hoc Networks, In. IEEE Network Magazine, Vol. 13, No. 6, Nov/Dec 1999, 24-30.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
|